Loading ttcn/Security/LibItsSecurity_Functions.ttcn +8 −7 Original line number Diff line number Diff line Loading @@ -1362,10 +1362,10 @@ module LibItsSecurity_Functions { // var boolean v_result; // Setup certificates memory cache /* FIXME To be reviewed if (fx_loadCertificates(PX_CERTIFICATE_POOL_PATH, p_configId) == true) { if (fx_loadCertificates(PX_CERTIFICATE_POOL_PATH, p_configId) == true) { // Setup security component variables if(f_readCertificate(cc_taCert_A, vc_atCertificate)) { if(f_readCertificate(oct2str(vc_atCertificate.cracaId), vc_aaCertificate)) { /*FIXME if(f_readCertificate(cc_taCert_A, vc_atCertificate)) { if(f_readCertificate(oct2str(vc_atCertificate.issuer), vc_aaCertificate)) { if(f_readSigningKey(cc_taCert_A, vc_signingPrivateKey)) { f_readEncryptingKey(cc_taCert_A, vc_encryptPrivateKey); return true; Loading @@ -1376,10 +1376,10 @@ module LibItsSecurity_Functions { } }else{ log("f_loadCertificates: Failed to load AT certificate for ", cc_taCert_A); } }*/ } else { log("f_loadCertificates: Failed to load certificates from ", PX_CERTIFICATE_POOL_PATH); }*/ } return false; } // End of function f_loadCertificates Loading Loading @@ -1667,6 +1667,7 @@ module LibItsSecurity_Functions { * @return true on success, false otherwise */ external function fx_loadCertificates(in charstring p_rootDirectory, in charstring p_configId) return boolean; external function fx_store_certificate(in charstring p_cert_id, in octetstring p_cert, in octetstring p_private_key, in octetstring p_public_key_x, in octetstring p_public_key_y, in octetstring p_hashid8, in octetstring p_issuer) return boolean; /** * @desc Unload from memory cache the certificates Loading Loading
ttcn/Security/LibItsSecurity_Functions.ttcn +8 −7 Original line number Diff line number Diff line Loading @@ -1362,10 +1362,10 @@ module LibItsSecurity_Functions { // var boolean v_result; // Setup certificates memory cache /* FIXME To be reviewed if (fx_loadCertificates(PX_CERTIFICATE_POOL_PATH, p_configId) == true) { if (fx_loadCertificates(PX_CERTIFICATE_POOL_PATH, p_configId) == true) { // Setup security component variables if(f_readCertificate(cc_taCert_A, vc_atCertificate)) { if(f_readCertificate(oct2str(vc_atCertificate.cracaId), vc_aaCertificate)) { /*FIXME if(f_readCertificate(cc_taCert_A, vc_atCertificate)) { if(f_readCertificate(oct2str(vc_atCertificate.issuer), vc_aaCertificate)) { if(f_readSigningKey(cc_taCert_A, vc_signingPrivateKey)) { f_readEncryptingKey(cc_taCert_A, vc_encryptPrivateKey); return true; Loading @@ -1376,10 +1376,10 @@ module LibItsSecurity_Functions { } }else{ log("f_loadCertificates: Failed to load AT certificate for ", cc_taCert_A); } }*/ } else { log("f_loadCertificates: Failed to load certificates from ", PX_CERTIFICATE_POOL_PATH); }*/ } return false; } // End of function f_loadCertificates Loading Loading @@ -1667,6 +1667,7 @@ module LibItsSecurity_Functions { * @return true on success, false otherwise */ external function fx_loadCertificates(in charstring p_rootDirectory, in charstring p_configId) return boolean; external function fx_store_certificate(in charstring p_cert_id, in octetstring p_cert, in octetstring p_private_key, in octetstring p_public_key_x, in octetstring p_public_key_y, in octetstring p_hashid8, in octetstring p_issuer) return boolean; /** * @desc Unload from memory cache the certificates Loading